---
_id: '9913'
abstract:
- lang: eng
  text: Reconfigurable hardware has received considerable attention as a platform
    that enables dynamic hardware updates and thus is able to adapt new configurations
    at runtime. However, due to their dynamic nature, e.g., field-programmable gate
    arrays (FPGA) are subject to a constant possibility of attacks, since each new
    configuration might be compromised. Trojans for reconfigurable hardware that evade
    state-of-the-art detection techniques and even formal verification, are thus a
    large threat to these devices. One such stealthy hardware Trojan, that is inserted
    and activated in two stages by compromised electronic design automation (EDA)
    tools, has recently been presented and shown to evade all forms of classical pre-configuration
    detection techniques. This paper presents a successful pre-configuration countermeasure
    against this ``Malicious Look-up-table (LUT)''-hardware Trojan, by employing bitstream-level
    Proof-Carrying Hardware (PCH). We show that the method is able to alert innocent
    module creators to infected EDA tools, and to prohibit malicious ones to sell
    infected modules to unsuspecting customers.
author:
- first_name: Qazi Arbab
  full_name: Ahmed, Qazi Arbab
  id: '72764'
  last_name: Ahmed
  orcid: 0000-0002-1837-2254
- first_name: Tobias
  full_name: Wiersema, Tobias
  id: '3118'
  last_name: Wiersema
- first_name: Marco
  full_name: Platzner, Marco
  id: '398'
  last_name: Platzner
citation:
  ama: 'Ahmed QA, Wiersema T, Platzner M. Proof-Carrying Hardware Versus the Stealthy
    Malicious LUT Hardware Trojan. In: Hochberger C, Nelson B, Koch A, Woods R, Diniz
    P, eds. <i>Applied Reconfigurable Computing</i>. Vol 11444. Lecture Notes in Computer
    Science. Springer International Publishing; 2019:127-136. doi:<a href="https://doi.org/10.1007/978-3-030-17227-5_10">10.1007/978-3-030-17227-5_10</a>'
  apa: Ahmed, Q. A., Wiersema, T., &#38; Platzner, M. (2019). Proof-Carrying Hardware
    Versus the Stealthy Malicious LUT Hardware Trojan. In C. Hochberger, B. Nelson,
    A. Koch, R. Woods, &#38; P. Diniz (Eds.), <i>Applied Reconfigurable Computing</i>
    (Vol. 11444, pp. 127–136). Springer International Publishing. <a href="https://doi.org/10.1007/978-3-030-17227-5_10">https://doi.org/10.1007/978-3-030-17227-5_10</a>
  bibtex: '@inproceedings{Ahmed_Wiersema_Platzner_2019, place={Cham}, series={Lecture
    Notes in Computer Science}, title={Proof-Carrying Hardware Versus the Stealthy
    Malicious LUT Hardware Trojan}, volume={11444}, DOI={<a href="https://doi.org/10.1007/978-3-030-17227-5_10">10.1007/978-3-030-17227-5_10</a>},
    booktitle={Applied Reconfigurable Computing}, publisher={Springer International
    Publishing}, author={Ahmed, Qazi Arbab and Wiersema, Tobias and Platzner, Marco},
    editor={Hochberger, Christian and Nelson, Brent and Koch, Andreas and Woods, Roger
    and Diniz, Pedro}, year={2019}, pages={127–136}, collection={Lecture Notes in
    Computer Science} }'
  chicago: 'Ahmed, Qazi Arbab, Tobias Wiersema, and Marco Platzner. “Proof-Carrying
    Hardware Versus the Stealthy Malicious LUT Hardware Trojan.” In <i>Applied Reconfigurable
    Computing</i>, edited by Christian Hochberger, Brent Nelson, Andreas Koch, Roger
    Woods, and Pedro Diniz, 11444:127–36. Lecture Notes in Computer Science. Cham:
    Springer International Publishing, 2019. <a href="https://doi.org/10.1007/978-3-030-17227-5_10">https://doi.org/10.1007/978-3-030-17227-5_10</a>.'
  ieee: 'Q. A. Ahmed, T. Wiersema, and M. Platzner, “Proof-Carrying Hardware Versus
    the Stealthy Malicious LUT Hardware Trojan,” in <i>Applied Reconfigurable Computing</i>,
    Darmstadt, Germany, 2019, vol. 11444, pp. 127–136, doi: <a href="https://doi.org/10.1007/978-3-030-17227-5_10">10.1007/978-3-030-17227-5_10</a>.'
  mla: Ahmed, Qazi Arbab, et al. “Proof-Carrying Hardware Versus the Stealthy Malicious
    LUT Hardware Trojan.” <i>Applied Reconfigurable Computing</i>, edited by Christian
    Hochberger et al., vol. 11444, Springer International Publishing, 2019, pp. 127–36,
    doi:<a href="https://doi.org/10.1007/978-3-030-17227-5_10">10.1007/978-3-030-17227-5_10</a>.
  short: 'Q.A. Ahmed, T. Wiersema, M. Platzner, in: C. Hochberger, B. Nelson, A. Koch,
    R. Woods, P. Diniz (Eds.), Applied Reconfigurable Computing, Springer International
    Publishing, Cham, 2019, pp. 127–136.'
conference:
  end_date: 2019-04-11
  location: Darmstadt, Germany
  name: 15th International Symposium on Applied Reconfigurable Computing (ARC 2019)
  start_date: 2019-04-09
date_created: 2019-05-22T07:36:05Z
date_updated: 2023-05-15T08:13:37Z
ddc:
- '000'
department:
- _id: '78'
doi: 10.1007/978-3-030-17227-5_10
editor:
- first_name: Christian
  full_name: Hochberger, Christian
  last_name: Hochberger
- first_name: Brent
  full_name: Nelson, Brent
  last_name: Nelson
- first_name: Andreas
  full_name: Koch, Andreas
  last_name: Koch
- first_name: Roger
  full_name: Woods, Roger
  last_name: Woods
- first_name: Pedro
  full_name: Diniz, Pedro
  last_name: Diniz
file:
- access_level: closed
  content_type: application/pdf
  creator: qazi
  date_created: 2023-05-11T09:12:33Z
  date_updated: 2023-05-11T09:12:33Z
  file_id: '44749'
  file_name: 978-3-030-17227-5_10.pdf
  file_size: 661354
  relation: main_file
  success: 1
file_date_updated: 2023-05-11T09:12:33Z
has_accepted_license: '1'
intvolume: '     11444'
language:
- iso: eng
main_file_link:
- open_access: '1'
oa: '1'
page: 127-136
place: Cham
project:
- _id: '12'
  name: SFB 901 - Subproject B4
- _id: '1'
  name: SFB 901
- _id: '3'
  name: SFB 901 - Project Area B
publication: Applied Reconfigurable Computing
publication_identifier:
  isbn:
  - 978-3-030-17227-5
publication_status: published
publisher: Springer International Publishing
series_title: Lecture Notes in Computer Science
status: public
title: Proof-Carrying Hardware Versus the Stealthy Malicious LUT Hardware Trojan
type: conference
user_id: '72764'
volume: 11444
year: '2019'
...
